Skip to content

UK wants to weasel out of demand for Apple encryption back door

Technology
50 30 17
  • Video game actors' strike officially ends after AI deal

    Technology technology
    11
    1
    121 Stimmen
    11 Beiträge
    61 Aufrufe
    paraphrand@lemmy.worldP
    huh, interesting! It’s The Mythical Man-Month! That book was published back in 1975. They definitely know better, but must be in quite a pickle.
  • 337 Stimmen
    19 Beiträge
    112 Aufrufe
    R
    What I'm speaking about is that it should be impossible to do some things. If it's possible, they will be done, and there's nothing you can do about it. To solve the problem of twiddled social media (and moderation used to assert dominance) we need a decentralized system of 90s Web reimagined, and Fediverse doesn't deliver it - if Facebook and Reddit are feudal states, then Fediverse is a confederation of smaller feudal entities. A post, a person, a community, a reaction and a change (by moderator or by the user) should be global entities (with global identifiers, so that the object by id of #0000001a2b3c4d6e7f890 would be the same object today or 10 years later on every server storing it) replicated over a network of servers similarly to Usenet (and to an IRC network, but in an IRC network servers are trusted, so it's not a good example for a global system). Really bad posts (or those by persons with history of posting such) should be banned on server level by everyone. The rest should be moderated by moderator reactions\changes of certain type. Ideally, for pooling of resources and resilience, servers would be separated by types into storage nodes (I think the name says it, FTP servers can do the job, but no need to be limited by it), index nodes (scraping many storage nodes, giving out results in structured format fit for any user representation, say, as a sequence of posts in one community, or like a list of communities found by tag, or ... , and possibly being connected into one DHT for Kademlia-like search, since no single index node will have everything), and (like in torrents?) tracker nodes for these and for identities, I think torrent-like announce-retrieve service is enough - to return a list of storage nodes storing, say, a specified partition (subspace of identifiers of objects, to make looking for something at least possibly efficient), or return a list of index nodes, or return a bunch of certificates and keys for an identity (should be somehow cryptographically connected to the global identifier of a person). So when a storage node comes online, it announces itself to a bunch of such trackers, similarly with index nodes, similarly with a user. One can also have a NOSTR-like service for real-time notifications by users. This way you'd have a global untrusted pooled infrastructure, allowing to replace many platforms. With common data, identities, services. Objects in storage and index services can be, say, in a format including a set of tags and then the body. So a specific application needing to show only data related to it would just search on index services and display only objects with tags of, say, "holo_ns:talk.bullshit.starwars" and "holo_t:post", like a sequence of posts with ability to comment, or maybe it would search objects with tags "holo_name:My 1999-like Star Wars holopage" and "holo_t:page" and display the links like search results in Google, and then clicking on that you'd see something presented like a webpage, except links would lead to global identifiers (or tag expressions interpreted by the particular application, who knows). (An index service may return, say, an array of objects, each with identifier, tags, list of locations on storage nodes where it's found or even bittorrent magnet links, and a free description possibly ; then the user application can unify responses of a few such services to avoid repetitions, maybe sort them, represent them as needed, so on.) The user applications for that common infrastructure can be different at the same time. Some like Facebook, some like ICQ, some like a web browser, some like a newsreader. (Star Wars is not a random reference, my whole habit of imagining tech stuff is from trying to imagine a science fiction world of the future, so yeah, this may seem like passive dreaming and it is.)
  • 349 Stimmen
    72 Beiträge
    392 Aufrufe
    M
    Sure, the internet is more practical, and the odds of being caught in the time required to execute a decent strike plan, even one as vague as: "we're going to Amerika and we're going to hit 50 high profile targets on July 4th, one in every state" (Dear NSA analyst, this is entirely hypothetical) so your agents spread to the field and start assessing from the ground the highest impact targets attainable with their resources, extensive back and forth from the field to central command daily for 90 days of prep, but it's being carried out on 270 different active social media channels as innocuous looking photo exchanges with 540 pre-arranged algorithms hiding the messages in the noise of the image bits. Chances of security agencies picking this up from the communication itself? About 100x less than them noticing 50 teams of activists deployed to 50 states at roughly the same time, even if they never communicate anything. HF (more often called shortwave) is well suited for the numbers game. A deep cover agent lying in wait, potentially for years. Only "tell" is their odd habit of listening to the radio most nights. All they're waiting for is a binary message: if you hear the sequence 3 17 22 you are to make contact for further instructions. That message may come at any time, or may not come for a decade. These days, you would make your contact for further instructions via internet, and sure, it would be more practical to hide the "make contact" signal in the internet too, but shortwave is a longstanding tech with known operating parameters.
  • Microsoft sued by authors over use of books in AI training

    Technology technology
    4
    1
    114 Stimmen
    4 Beiträge
    32 Aufrufe
    isaamoonkhgdt_6143@lemmy.zipI
    The writers alleged in the complaint that Microsoft used a collection of nearly 200,000 pirated books to train Megatron, an algorithm that gives text responses to user prompts. Which Megatron are we referring to? This [image: c747568b-0dd5-431e-bd19-2fbfdf5d372c.webp] Or This [image: 735a9693-ec67-489c-92f6-addb803291a4.webp]
  • Canadian telecom hacked by suspected China state group

    Technology technology
    3
    1
    57 Stimmen
    3 Beiträge
    25 Aufrufe
    M
    While this news is both expected and unsettling, I'm pretty keen on how our gov has this info available to the public. And the site itself - such a vast resource for security info, tools, etc. Not all of our gov nor all departments are something to behold, but our cyber teams are top notch. And holy shit: https://github.com/CybercentreCanada
  • Mudita Kompakt

    Technology technology
    17
    1
    62 Stimmen
    17 Beiträge
    86 Aufrufe
    anunusualrelic@lemmy.worldA
    There you go then. It's 80 €.
  • 44 Stimmen
    9 Beiträge
    54 Aufrufe
    M
    This will be a privacy nightmare.
  • 4 Stimmen
    15 Beiträge
    75 Aufrufe
    friendbesto@lemmy.mlF
    For future readers: Freetube currently works. Using it right now. Invidious works too, granted some instance do not. One needs to look for ones that are currently active.